<feed xmlns='http://www.w3.org/2005/Atom'>
<title>nginx.git/src/http, branch release-1.3.8</title>
<subtitle>nginx</subtitle>
<link rel='alternate' type='text/html' href='https://git.sigsegv.uk/nginx.git/'/>
<entry>
<title>Event pipe: fixed handling of buf_to_file data.</title>
<updated>2012-10-30T11:14:24+00:00</updated>
<author>
<name>Maxim Dounin</name>
<email>mdounin@mdounin.ru</email>
</author>
<published>2012-10-30T11:14:24+00:00</published>
<link rel='alternate' type='text/html' href='https://git.sigsegv.uk/nginx.git/commit/?id=8e67fb4226e6357477f32fbdd1443fb2bdd00b69'/>
<id>8e67fb4226e6357477f32fbdd1443fb2bdd00b69</id>
<content type='text'>
Input filter might free a buffer if there is no data in it, and in case
of first buffer (used for cache header and request header, aka p-&gt;buf_to_file)
this resulted in cache corruption.  Buffer memory was reused to read upstream
response before headers were written to disk.

Fix is to avoid moving pointers in ngx_event_pipe_add_free_buf() to a buffer
start if we were asked to free a buffer used by p-&gt;buf_to_file.

This fixes occasional cache file corruption, usually resulted
in "cache file ... has md5 collision" alerts.

Reported by Anatoli Marinov.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Input filter might free a buffer if there is no data in it, and in case
of first buffer (used for cache header and request header, aka p-&gt;buf_to_file)
this resulted in cache corruption.  Buffer memory was reused to read upstream
response before headers were written to disk.

Fix is to avoid moving pointers in ngx_event_pipe_add_free_buf() to a buffer
start if we were asked to free a buffer used by p-&gt;buf_to_file.

This fixes occasional cache file corruption, usually resulted
in "cache file ... has md5 collision" alerts.

Reported by Anatoli Marinov.
</pre>
</div>
</content>
</entry>
<entry>
<title>Variables $connection and $connection_requests.</title>
<updated>2012-10-29T17:17:59+00:00</updated>
<author>
<name>Maxim Dounin</name>
<email>mdounin@mdounin.ru</email>
</author>
<published>2012-10-29T17:17:59+00:00</published>
<link rel='alternate' type='text/html' href='https://git.sigsegv.uk/nginx.git/commit/?id=1e12e7fa1db39cf256d2219c394c118f3175053d'/>
<id>1e12e7fa1db39cf256d2219c394c118f3175053d</id>
<content type='text'>
Log module counterparts are removed as they aren't used often and
there is no need to preserve them for efficiency.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Log module counterparts are removed as they aren't used often and
there is no need to preserve them for efficiency.
</pre>
</div>
</content>
</entry>
<entry>
<title>ngx_http_keepalive_handler() is now trying to not keep c-&gt;buffer's memory for</title>
<updated>2012-10-23T14:36:18+00:00</updated>
<author>
<name>Valentin Bartenev</name>
<email>vbart@nginx.com</email>
</author>
<published>2012-10-23T14:36:18+00:00</published>
<link rel='alternate' type='text/html' href='https://git.sigsegv.uk/nginx.git/commit/?id=09dca40b332cf6c349bff409a9f993d04df35f12'/>
<id>09dca40b332cf6c349bff409a9f993d04df35f12</id>
<content type='text'>
idle connections.

This behaviour is consistent with the ngx_http_set_keepalive() function and it
should decrease memory usage in some cases (especially if epoll/rtsig is used).
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
idle connections.

This behaviour is consistent with the ngx_http_set_keepalive() function and it
should decrease memory usage in some cases (especially if epoll/rtsig is used).
</pre>
</div>
</content>
</entry>
<entry>
<title>Gunzip: fixed r-&gt;gzip_ok check.</title>
<updated>2012-10-18T14:27:40+00:00</updated>
<author>
<name>Maxim Dounin</name>
<email>mdounin@mdounin.ru</email>
</author>
<published>2012-10-18T14:27:40+00:00</published>
<link rel='alternate' type='text/html' href='https://git.sigsegv.uk/nginx.git/commit/?id=27b7eb17d081340515cd7ee3771d68af1c6d8267'/>
<id>27b7eb17d081340515cd7ee3771d68af1c6d8267</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>OCSP stapling: properly check if there is ssl.ctx.</title>
<updated>2012-10-05T11:09:14+00:00</updated>
<author>
<name>Maxim Dounin</name>
<email>mdounin@mdounin.ru</email>
</author>
<published>2012-10-05T11:09:14+00:00</published>
<link rel='alternate' type='text/html' href='https://git.sigsegv.uk/nginx.git/commit/?id=0d7a7e91cf57981e89dafb44794dcb9563e8a3fa'/>
<id>0d7a7e91cf57981e89dafb44794dcb9563e8a3fa</id>
<content type='text'>
This fixes segfault if stapling was enabled in a server without a certificate
configured (and hence no ssl.ctx).
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
This fixes segfault if stapling was enabled in a server without a certificate
configured (and hence no ssl.ctx).
</pre>
</div>
</content>
</entry>
<entry>
<title>Variable $bytes_sent.</title>
<updated>2012-10-03T15:25:36+00:00</updated>
<author>
<name>Maxim Dounin</name>
<email>mdounin@mdounin.ru</email>
</author>
<published>2012-10-03T15:25:36+00:00</published>
<link rel='alternate' type='text/html' href='https://git.sigsegv.uk/nginx.git/commit/?id=82989420adcf0cb4e0f00e5f689cb59554e4c24c'/>
<id>82989420adcf0cb4e0f00e5f689cb59554e4c24c</id>
<content type='text'>
It replicates variable $bytes_sent as previously available in log module
only.

Patch by Benjamin Grössing (with minor changes).
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
It replicates variable $bytes_sent as previously available in log module
only.

Patch by Benjamin Grössing (with minor changes).
</pre>
</div>
</content>
</entry>
<entry>
<title>Log: $apache_bytes_sent removed.</title>
<updated>2012-10-03T15:25:06+00:00</updated>
<author>
<name>Maxim Dounin</name>
<email>mdounin@mdounin.ru</email>
</author>
<published>2012-10-03T15:25:06+00:00</published>
<link rel='alternate' type='text/html' href='https://git.sigsegv.uk/nginx.git/commit/?id=a707811a31455979744e0c456882dd0fa2e9e139'/>
<id>a707811a31455979744e0c456882dd0fa2e9e139</id>
<content type='text'>
It was renamed to $body_bytes_sent in nginx 0.3.10 and the old name is
deprecated since then.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
It was renamed to $body_bytes_sent in nginx 0.3.10 and the old name is
deprecated since then.
</pre>
</div>
</content>
</entry>
<entry>
<title>SSL: the "ssl_verify_client" directive parameter "optional_no_ca".</title>
<updated>2012-10-03T15:24:08+00:00</updated>
<author>
<name>Maxim Dounin</name>
<email>mdounin@mdounin.ru</email>
</author>
<published>2012-10-03T15:24:08+00:00</published>
<link rel='alternate' type='text/html' href='https://git.sigsegv.uk/nginx.git/commit/?id=c846871ce106e0fbe4c27a48a4c3378f18cd03f8'/>
<id>c846871ce106e0fbe4c27a48a4c3378f18cd03f8</id>
<content type='text'>
This parameter allows to don't require certificate to be signed by
a trusted CA, e.g. if CA certificate isn't known in advance, like in
WebID protocol.

Note that it doesn't add any security unless the certificate is actually
checked to be trusted by some external means (e.g. by a backend).

Patch by Mike Kazantsev, Eric O'Connor.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
This parameter allows to don't require certificate to be signed by
a trusted CA, e.g. if CA certificate isn't known in advance, like in
WebID protocol.

Note that it doesn't add any security unless the certificate is actually
checked to be trusted by some external means (e.g. by a backend).

Patch by Mike Kazantsev, Eric O'Connor.
</pre>
</div>
</content>
</entry>
<entry>
<title>Version bump.</title>
<updated>2012-10-03T15:22:18+00:00</updated>
<author>
<name>Maxim Dounin</name>
<email>mdounin@mdounin.ru</email>
</author>
<published>2012-10-03T15:22:18+00:00</published>
<link rel='alternate' type='text/html' href='https://git.sigsegv.uk/nginx.git/commit/?id=f8cc8969d52211530c0eba3d28e0cb03d4f958b3'/>
<id>f8cc8969d52211530c0eba3d28e0cb03d4f958b3</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>OCSP stapling: ssl_stapling_verify directive.</title>
<updated>2012-10-01T12:53:11+00:00</updated>
<author>
<name>Maxim Dounin</name>
<email>mdounin@mdounin.ru</email>
</author>
<published>2012-10-01T12:53:11+00:00</published>
<link rel='alternate' type='text/html' href='https://git.sigsegv.uk/nginx.git/commit/?id=bec2cc5286e5888eb1de9462f7c64b922967b47b'/>
<id>bec2cc5286e5888eb1de9462f7c64b922967b47b</id>
<content type='text'>
OCSP response verification is now switched off by default to simplify
configuration, and the ssl_stapling_verify allows to switch it on.

Note that for stapling OCSP response verification isn't something required
as it will be done by a client anyway.  But doing verification on a server
allows to mitigate some attack vectors, most notably stop an attacker from
presenting some specially crafted data to all site clients.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
OCSP response verification is now switched off by default to simplify
configuration, and the ssl_stapling_verify allows to switch it on.

Note that for stapling OCSP response verification isn't something required
as it will be done by a client anyway.  But doing verification on a server
allows to mitigate some attack vectors, most notably stop an attacker from
presenting some specially crafted data to all site clients.
</pre>
</div>
</content>
</entry>
</feed>
